Wombat Security Named a Leader for Third Consecutive Year
We are honored and excited to confirm that Wombat Security has been positioned by Gartner, Inc. as a Leader in the 2016 Magic Quadrant for Security Awareness Computer-Based Training.* This is the third year in a row that we’ve been placed in the Leader quadrant, and our position within the quadrant reflects our clear commitment to excellence and our desire to continue to elevate our products and our platform.
One of 19 vendors evaluated for the Magic Quadrant, we were designated as a Leader as a result of our vision and ability to execute. As in prior years, Gartner assessed vendors on their products and/or services as well as criteria that included overall viability, sales execution/pricing, market responsiveness/record, marketing execution, and operations. According to Gartner, customer satisfaction is one of the key factors used in evaluating a vendor's ability to execute, and innovation is a "heavily weighted" factor in its assessment of a vendor's completeness of vision.
At Wombat, we hold our customers in high regard, and we continuously strive to deliver products that help them to effectively change behaviors and reduce risk across their organizations. Their success is our success, and we are thrilled to share that customers who have applied our unique and innovative methodology with success have seen up to a 90% reduction in successful external phishing attacks and malware infections. Additional benefits related to these behavior improvements include less employee downtime; more effective use of IT resources; and better identification (and reporting) of suspicious messages.
We Will Never Rest on Our Laurels
Since we were named a Leader in the 2015 Magic Quadrant for Security Awareness Computer-Based Training, we’ve worked hard to deliver enhancements to our portfolio and platform. Our biggest news of the past year came just days after the 2015 Gartner announcement, when we acquired ThreatSim®, a move that has helped us build a best-in-breed solution for current and future customers who are seeking opportunities to change user behavior and reduce risk across their organizations.
But we’ve also had a number of other noteworthy advancements in the past 12 months, including the following:
New Mobile-Responsive, 508- and WCAG-Compliant Training Modules
We’ve launched several new training modules this year in a new mobile-responsive design format, which allows end users to view and interact with our training anytime, anywhere, on any size device. The added bonus: Our mobile-responsive modules conform to the U.S. Section 508 standard and the international Web Content Accessibility Guidelines (WCAG) 2.0 AA standard, which increases security awareness and training flexibility and accessibility for organizations and their employees.
Recent additions to our interactive training portfolio include our Security Essentials for Executives standard module and two new mini-modules: Protecting Against Ransomware and USB Device Safety.
To view our complete portfolio, visit our website.
GA of PhishAlarm Analyzer
Back in February, we announced PhishAlarm® Analyzer, a complement to our PhishAlarm one-click email reporting tool. Generally available as of July, PhishAlarm Analyzer uses machine learning to analyze and prioritize messages submitted via the PhishAlarm email client add-in. This software-based threat analysis tool is helping infosec officers and security response teams to quickly isolate and remediate suspected phishing messages, including zero-hour attacks.
More Wombat Wisdom Out in the World
In September, we hosted our second annual Wombat Wisdom Security Awareness and Training Conference in our home town of Pittsburgh, PA. Bigger and better than our inaugural 2014 conference, this year we welcomed customers and non-customers alike and received excellent feedback about the tips and insights shared and learned. We hope you will join us in 2017!
Shortly after the close of that event, we launched our Wombat Wisdom Community, which was created in response to customer feedback from our first Wombat Wisdom Conference. Our Community provides a centralized place online to collaborate with other Wombat customers, view Knowledgebase articles and documentation from our support team, and keep up-to-date with product updates, company happenings, and more.
In other exciting developments, in August we announced the opening of our new UK office, an expansion that further extends our multinational support and our ability to satisfy the growing European and international demand for our leading security awareness and training products.
Data and Research That Are Making the Case for Better Awareness and Training
The State of the Phish Report showcased data pulled from millions of simulated phishing attacks sent over the course of a year, along with the results of a survey of hundreds of infosec professionals. The Beyond the Phish Report dug into data drawn from our Security Education Platform, including the results from nearly 20 million questions asked and answered about nine cybersecurity topics.
Both reports show the significance of the risks that organizations are facing across all vertical markets, and the need to close the end-user knowledge gap. They are excellent resources for any organization that wants real-world proof points about these threats.
Looking to 2017…and Beyond
We are already planning for more great things in the coming years ahead. Our goal has always been to lead the market — and proof of our ability to execute on our vision can be seen in the number of competitors who continue to try to emulate our products and methodology.
Wombat founders pioneered the use of simulated phishing attacks, and we haven’t stopped innovating since. We hope you will continue to follow our progress and share with others the importance of a security strategy that marries user remediation and device remediation. This, we believe, holds the key to effective and long-lasting end-user risk management.
* Source: Gartner, Magic Quadrant for Security Awareness Computer-Based Training, Perry Carpenter and Joanna G. Huisman, 25 October 2016.
Please note: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including all warranties of merchantability or fitness for a particular purpose.